VIP: a Virtual Interface-based approach for vertical handover in single-subnet networks

Size: px
Start display at page:

Download "VIP: a Virtual Interface-based approach for vertical handover in single-subnet networks"

Transcription

1 VIP: a Virtual Interface-based approach for vertical handover in single-subnet networks Wei-Cheng Xiao, Shih-Hsuan Tang, and Cheng-Fu Chou Department of Computer Science and Information Engineering National Taiwan University {b89099, r93057, ccf}@csie.ntu.edu.tw Ling-Jyh Chen Institute of Information Science Academia Sinica [email protected] Abstract We propose a simple and practical solution, called the Virtual Interface-based approach (VIP), for seamless vertical handover in single-subnet networks. VIP combines a virtual interface and ARP update messages to achieve vertical handovers, and can run stand-alone without modification of existing network protocols or installation of additional servers. Therefore, it is ready for immediate realworld deployment. Using testbed experiments, we evaluate VIP by observing TCP (FTP downloading) behavior in various vertical handover scenarios. The results show that the proposed approach can successfully maintain an application s connectivity in all test cases. Furthermore, the results show that handover from a low capacity link to a high capacity link does not cause service latency; however, during handover from a high capacity link to a lower capacity link, non-negligible latency can not be alleviated unless early handover notification is provided. 1. Introduction With the growing demands of mobile and wireless applications, the need for a simple yet efficient seamless handover solution that can transparently switch a connection across different network technologies (i.e., vertical handover) is becoming increasingly important. For instance, a user may have to switch an ongoing connection from Ethernet to IEEE b because he/she has roamed out of the cable range, or switch the connection from IEEE b to IEEE a because the former s channels suffer from serious interference. A seamless handover solution with both low latency and low packet loss is essential for mobile users who wish to receive continuous, uninterrupted network service while switching from one network connection to another. Additionally, the handover solution should be network-layer-transparent and infrastructure-modificationfree so that existing network applications can accommodate the changes wrought by the rapid evolution of wireless technology. The goal of seamless handover is to provide continuous connections for end-to-end data transmissions in the event of any link outage or handover anomaly. This involves two critical design issues: low latency and low packet loss. Low latency requires that the switch to the new path must be completed almost instantaneously; that is, service interruption should be minimized to provide the illusion of continuous connectivity. In the event of an actual connection failure, the architecture must attempt to re-connect the client as soon as the service is restored. Furthermore, packet loss due to the connection switching must also be minimized. Various seamless vertical handover solutions have been proposed in the last decade. Based on their implementations in the OSI 7 layer network model, the schemes can be grouped into three main categories: network layer approaches [6] [13], transport layer approaches [2] [12] [15] [18], and upper layer approaches [4] [7] [11] [14] [16]. All the schemes have two properties in common: (1) they support vertical handover across different network domains; and (2) they are not stand alone approaches (i.e., they have to either modify existing network protocols like TCP/IP, or otherwise install additional servers on the Internet); thus, deployment of these approaches is considered costly. In this paper, we propose a Virtual Interface based approach (VIP) that not only satisfies the requirements for

2 seamless vertical handover, but is also simple, light-weight, and ready for real deployment immediately. Unlike previous handover schemes, VIP concentrates on the emerging scenarios of single-subnet networks (e.g., home networking, campus networking, and office networking), and trades the support of handover across multiple network domains for simplicity in the approach s design. More precisely, VIP cleverly combines the use of a virtual interface and ARP update messages to achieve vertical handover, and can run stand-alone without modification of existing network protocols/applications or installation of additional servers/services. Using testbed experiments, we evaluate VIP by observing TCP (FTP downloading) behavior in various vertical handover scenarios. The results show that VIP can successfully maintain an application s connectivity in all cases. Furthermore, the results show that handover from a low capacity link to a high capacity link does not cause service latency; however, during handover from a high capacity link to a lower capacity link, non-negligible latency can not be alleviated unless early handover notification is provided. The rest of the paper is organized as follows. In Section 2, we summarize related work and recap the definition of vertical handover. Section 3 describes the enabling mechanisms behind VIP. Section 4 contains the experiment results for various vertical handover scenarios. Finally, in Section 5 we present our conclusions. 2. Background and Related Work Vertical handover is the process of switching an ongoing network connection from one interface to another interface [17], as shown in Fig. 1. With the eventual unification of cellular and IP networks, providing seamless vertical handover support for mobile users has become increasingly important and desirable. The biggest challenge in designing a seamless vertical handover scheme lies in maintaining an established application session, such as a connectionoriented flow like TCP, while providing smooth (low loss) and fast (low delay) data transmission. Mobile IP, a network layer solution for vertical handover scenarios, is the current IETF standard for Internet mobility support [13]. It ensures the delivery of packets to a mobile host by using a home address, instead of sending them directly via the mobile host s current Internet address (i.e., its care-of address). An address translator is deployed on the home agent, and an IP tunnel between the home agent and a foreign agent is carefully maintained; therefore, after handover to the foreign agent s network, all ongoing traffic destined for the home agent will be forwarded to the foreign agent (and then to the mobile host) through the IP tunnel. As a result, handover to the upper layer applications is transparent, and the connectivity can be maintained. IPv6 [6], the subsequent network layer protocol, provides native mobility support. By combining the home address and the care-of address into a 128-bit Internet address, IPv6 can easily support vertical handover scenarios without deploying foreign agents and address translators on the home agents. Besides network layer solutions, several handover solutions use transport layer approaches [2] [12] [15] [18]. In [2], the authors proposed the use of Indirect TCP (I-TCP), which deals with handovers by splitting a connection into two segments: a fixed (wired) connection, and a mobile (wireless) connection. However, I-TCP is expensive to deploy and suffers from loss of end-to-end semantics. Meanwhile, in [12] [18], a multi-homing technique is used to support vertical handover. The deployment of the above solutions requires upgrading of both of the transport layer and the applications on mobile hosts and Internet servers. Consequently, the deployment cost is still too high. Another end-to-end approach supports host mobility by dynamically updating the Domain Name System (DNS) and adding a set of Migrate options to TCP [15]. However, this scheme not only requires mobile hosts to be updated, but also calls for all DNS servers worldwide to be upgraded, which is obviously impractical. Additionally, several proxy-based solutions have been proposed to address network heterogeneity problems, such as mobility and vertical handover [4] [7] [11] [14] [16]. Using a split-connection proxy, the mobile host can maintain application sessions virtually, even in the presence of vertical handovers. Although the end-to-end semantics can be preserved, since the handover is transparent to the transport and application layers, such proxy-based solutions suffer from scalability problems due to the limited resources and computational capability of individual proxies. 3. Proposed Approach: VIP Figure 1. Horizontal and Vertical Handover In this section, we present our proposed vertical handover scheme, called VIP (a Virtual Interface-based approach). Unlike previous handover schemes, VIP is de-

3 Figure 2. Basic system design of the OSI network architecture. signed for the specialized and emerging scenarios of singlesubnet networks (e.g., home networking, campus networking, and office networking), and trades the support of universal handovers across multiple network domains for simplicity in the approach s design. As a result, VIP is simple and practical, and does not need to change upper-layer applications/protocols or deploy additional servers on the Internet. In the following, we discuss VIP in details Basic Ideas As mentioned previously, VIP is designed for the specialized and increasingly popular scenarios where vertical handover takes place within the same subnet (e.g., a user may employ an Ethernet connection in his/her cubicle, but has to hand over to Wi-Fi when leaving for the conference room). It is not the goal of VIP to provide a universal solution for vertical handovers across the heterogeneous networks of different network domains. In VIP, a Virtual Interface Layer (VIL) is inserted between the network layer and the data link layer, as illustrated in Fig. 2. The VIL is composed of two components, namely the Virtual Interface (VI) and the Kernel Interface Selector (KIS). It is the responsibility of KIS to determine the best physical network interface and link it to the virtual interface (VI). The decision about the best network interface (i.e., the one that can yield the best network performance at the time) is beyond the scope of this paper, but the issue has been addressed by several previous studies [3] [10] [19] [20]. Note that the VI is a dummy network interface that does Figure 3. When handover occurs, an ARP message is sent out to update the ARP table on the gateway. not exist physically. However, the VIP scheme assigns an IP address to the VI (instead of the selected physical network interface) and treats it as the default networking interface of the mobile host (i.e., the communications of the upper layer applications are bound to the VI, instead of to physical interfaces). Once a physical interface has been selected and linked (by KIS), the VIP scheme ensures that all outgoing traffic is sent from the VI, through the selected physical interface, and then to the network. The scheme also ensures that all incoming traffic is forwarded from the active (selected) physical interface, to the VI, and then to the system kernel. Since all network interfaces (including the VI and the physical ones) are within the same subnet, end-to-end connectivity can be easily maintained during vertical handovers. Next, we describe our implementation in details.

4 3.2. VIP Implementation The proposed VIP scheme is implemented by dynamically invoking the ARP update messages that link the MAC address of a newly selected interface to the VI to complete a vertical handover. We denote the IP address of the VI as IP s, the MAC address of the physical interface employed before the vertical handover as MAC old, and the MAC address of the newly selected network interface for vertical handover as MAC new. Fig. 3 illustrates the vertical handover process, where a mobile host (sender) communicates with a receiver on the Internet via a gateway. The vertical handover takes place on the first hop link (i.e., the link between the sender and the gateway). As shown in Fig. 3, the mobile host (MH) uses the original physical interface to communicate with the receiver initially. In the packet header of each outgoing packet of the MH, the MAC address and IP address are set to MAC old and IP s respectively. Note that, while the IP s is employed as an identity for Internet routing purposes, MAC old is used for data transmission on the last hop (i.e., from the gateway to the sender). Therefore, the gateway host also maintains an ARP table to translate IP addresses into MAC addresses for last-mile connection. Of course, the ARP table has an entry with the IP s mapped to MAC old before the vertical handover occurred. When a vertical handover is triggered 1, the sender immediately transmits an ARP update message (i.e., IP s mapped to MAC new ) to the gateway, which will then update its ARP table accordingly. As a result, all subsequent incoming packets (i.e., from the gateway to the sender) will be forwarded to the interface whose MAC address is the same as MAC new. Thus, vertical handover (from the initial interface with MAC old to the newly selected interface with MAC new ) can be achieved seamlessly. 4. Evaluation 4.1. VIP Testbed First, we describe the VIP testbed and experiments. The mobile host is a Linux based laptop (Debian Linux with kernel version ) with an Intel Pentium M 1.73 GHz CPU and 512MB Memory, as shown in Fig. 4. The Internet gateways are set up using two wireless access points: a Linksys WAP55AG router, and a Buffalo WLA2-G54C 1 As mentioned previously, we do not implement an intelligent handover manager [3] [10] [19] [20] since it is beyond the scope of this study. Instead, in the current work, all vertical handovers are triggered manually by simply writing commands to a pre-defined file in the /proc filesystem of the Linux system, which will promptly respond accordingly. The /proc filesystem can be thought as an interface for exchanging messages/commands between the user and the kernel spaces. Figure 4. Illustration of the VIP testbed. The MH is equipped with an IEEE a interface and an IEEE b interface, both of which operate within the same subnet. access point. In the experiment, the Linksys router is configured to serve as an IEEE a access point, while the Buffalo access point provides an IEEE b connection. Both the a and b networks are configured within the same subnet. Specifically, the mobile host is equipped with a builtin Intel PRO/Wireless 2200BG NIC and a PCMCIA-based wireless NIC (which is a D-Link DWL-AG a/b/g Wireless NIC). The former is used to set up an IEEE b connection to the Buffalo access point, and the latter is used for the IEEE a connection to the Linksys router. First, we evaluate vertical handover from the b connection to the a connection (i.e., LOW to HIGH), followed by handover from a to b (i.e., HIGH to LOW). In each experiment, the MH downloads a large file from a remote FTP server during the vertical handover. We run Ethereal [1] on the MH to capture all outgoing/incoming packets on the virtual interface for further analysis. The experiment results are presented below Experiment I: Vertical Handover from Low to High In the first experiment, we perform vertical handovers from the low bandwidth link (i.e., IEEE b, 11Mbps mode) to the higher one (i.e., IEEE a, 54Mbps mode). The vertical handover is triggered manually at about 7.2 seconds. Fig. 5 depicts the TCP performance during the handover. From Fig. 5, we observe that the average TCP throughput increases from 1,000 KBps to about 2,700 KBps after the LOW-to-HIGH vertical handover, and the sequence number curve of the TCP connection does not exhibit additional latency during the handover. Vertical handover to the upper layer FTP applications is seamless and transparent. Moreover, the TCP session can take advantage of the

5 (a) TCP Sequence Number (b) FTP Throughput Figure 5. The changes in the TCP sequence number and FTP throughput before and after handover in the first experiment (802.11b to a). (a) TCP Sequence Number (b) FTP Throughput Figure 6. The changes in the TCP sequence number and FTP throughput before and after handover in the second experiment (802.11a to b).

6 increased bandwidth after the vertical handover because of its AIMD-based congestion control algorithm Experiment II: Vertical Handover from High to Low In the second experiment, the vertical handover is from the high bandwidth link (i.e., IEEE a, 54Mbps mode) to the lower link (i.e., IEEE b, 11Mbps mode), and is triggered manually at about 10.0 seconds. Fig. 6 shows the TCP performance during vertical handover. Fig. 6-a shows that the sequence number curve of the TCP connection increased monotonically during the transmission, but held for several microseconds when the HIGHto-LOW vertical handover was triggered. Meanwhile, Fig. 6-b shows that the simultaneous TCP throughput dropped to almost zero when the vertical handover occurred, and then returned to about 1,000 KBps after a few microseconds. The results demonstrate that the TCP session can be maintained by the proposed VIP scheme during HIGH-to- LOW vertical handover; however, the ongoing TCP connection will be frozen for several microseconds. We repeated the experiment 10 times and found the freeze period was about 0.12ms in average. The reason for the freeze period is because the TCP connection stored a few packets on the last hop link (i.e., between the MH and the IEEE a access point), and these outstanding packets are lost when HIGH-to-LOW vertical handover occurs, as shown in Fig. 7. The bulk packet loss causes contiguous TCP timeouts and thus degrades the throughput performance of FTP downloading. This problem can be resolved by employing specialized TCP variants (e.g., Freeze-TCP [8]), or by implementing other QoS enhancement schemes (e.g., Explicit Handover Notifications [9] or ERR+EHN [5]). Figure 7. The shaded region represents the amount of outstanding data that will be lost during HIGH-TO-LOW vertical handover. 5. Conclusion We have proposed a simple and practical vertical handover solution, called VIP, for single subnet scenarios. VIP is seamless and does not necessitate any modifications of the current network infrastructure. Using testbed experiments, we evaluated VIP in two home networking scenarios. The results show that our method can maintain an application s connectivity (i.e., TCP session) without introducing additional latency during a vertical handover. We also discussed the QoS issue of TCP connection in HIGH-to-LOW vertical handover scenarios. In our ongoing work, we will investigate vertical handover scenarios, in which the link capacity and round-trip delay may change dramatically after handover, and design appropriate adaptation schemes so that applications can adapt more effectively in mobile computing environments. 6. Acknowledgements This material is based upon work supported by the National Science Council under grant number NSC E References [1] Ethereal: A network protocol analyzer. [2] A. Bakre and B. Badrinath. I-tcp: Indirect tcp for mobile hosts. In IEEE ICDCS, [3] L.-J. Chen, T. Sun, B. Chen, and M. Gerla. A smart decision model for vertical handoff. In The 4th ANWIRE International Workshop on Wireless Internet and Reconfigurability, [4] L.-J. Chen, T. Sun, and M. Gerla. Usha: A practical vertical handoff solution. In IEEE MSAN, [5] L.-J. Chen, G. Yang, T. Sun, M. Y. Sanadidi, and M. Gerla. Enhancing qos support for vertical handoffs using implicit/explicit handoff notifications. In QShine, [6] S. Deering and R. Hinden. Internet protocol, version 6 (ipv6) specification. Technical report, IETF RFC 2460, December [7] V. Ghini, G. Pau, M. Roccetti, and P. S. M. Gerla. Smart download on the go: A wireless internet application for music distribution over heterogeneous networks. In IEEE ICC, [8] T. Goff, J. Moronski, and D. S. Phatak. Freeze-tcp: A true end-to-end tcp enhancement mechanism for mobile environments. In IEEE Infocom, [9] A. Gurtov and J. Korhonen. Measurement and analysis of tcp-friendly rate control for vertical handovers. ACM MCCR, [10] B. Liang, A. H. Zahran, and A. O. Saleh. Applicaion signal threshold adaptation for vertical handoff in heterogeneous wireless networks. In IFIP Networking, 2005.

7 [11] D. A. Maltz and P. Bhagwat. Msocks: An architecture for transport layer mobility. In IEEE Infocom, pages , March [12] A. Matsumoto, M. Kozuka, K. Fujikawa, and Y. Okabe. Tcp multi-home options. Technical report, draft-arifumi-tcp-mh- 00.txt, IETF Internet draft, October [13] C. Perkins. Ip mobility support for ipv4. Technical report, IETF RFC 3344, August [14] M. Schlager, B. Rathke, S. Bodenstein, and A. Wolisz. Advocating a remote socket architecture for internet access using wireless lans. Journal of Mobile Networks and Applications, 6:23 42, [15] A. Snoeren. A Session-Based Approach to Internet Mobility. PhD thesis, Massachusetts Institute of Technology, December [16] A. C. Snoeren and H. Balakrishnan. An end-to-end approach to host mobility. In ACM MobiCom, [17] M. Stemm and R. H. Katz. Vertical handoffs in wireless overlay networks. ACM Mobile Networking (MONET), [18] R. Stewart, Q. Xie, K. Morneault, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson. Stream control transmission protocol. Technical report, IETF RFC 2960, October [19] H. Wang, R. H. Katz, and J. Giese. Policy-enabled handoffs across heterogeneous wireless networks. In ACM WMCSA, [20] F. Zhu and J. McNair. Optimization for vertical handoff decision algorithms. In IEEE WCNC, 2004.

Network Friendliness of Mobility Management Protocols

Network Friendliness of Mobility Management Protocols Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom

119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom A Mobility Management Scheme using - for Realtime Services across Heterogeneous Networks Hyelim Park 1 Myungchul Kim 1 Sooyong Lee 1 Sungwon Kang 1 Yongho Kim 2 1 School of Engineering, Information and

More information

Mobile SCTP Transport Layer Mobility Management for the Internet

Mobile SCTP Transport Layer Mobility Management for the Internet Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: [email protected] Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: [email protected]

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. [email protected]

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,

More information

VMWARE WHITE PAPER 1

VMWARE WHITE PAPER 1 1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern

More information

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

An Experimental Study on Wireless Security Protocols over Mobile IP Networks An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

ECHO: A Quality of Service based Endpoint Centric Handover scheme for VoIP

ECHO: A Quality of Service based Endpoint Centric Handover scheme for VoIP ECHO: A Quality of Service based Endpoint Centric Handover scheme for VoIP John Fitzpatrick, Seán Murphy, Mohammed Atiquzzaman*, John Murphy Performance Engineering Lab, School of Computer Science and

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

High Performance VPN Solutions Over Satellite Networks

High Performance VPN Solutions Over Satellite Networks High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Fibre Channel over Ethernet in the Data Center: An Introduction

Fibre Channel over Ethernet in the Data Center: An Introduction Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification

More information

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.

More information

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr

More information

A Performance Study of VoIP Applications: MSN vs. Skype

A Performance Study of VoIP Applications: MSN vs. Skype This full text paper was peer reviewed by subject matter experts for publication in the MULTICOMM 2006 proceedings. A Performance Study of VoIP Applications: MSN vs. Skype Wen-Hui Chiang, Wei-Cheng Xiao,

More information

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory

More information

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces 1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013 the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN [email protected]

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

WAN Performance Analysis A Study on the Impact of Windows 7

WAN Performance Analysis A Study on the Impact of Windows 7 A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS MOBILITY SUPPORT USING INTELLIGENT USER SADOWS FOR NEXT-GENERATION WIRELESS NETWORKS Gergely V. Záruba, Wei Wu, Mohan J. Kumar, Sajal K. Das enter for Research in Wireless Mobility and Networking Department

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Boosting mobility performance with Multi-Path TCP

Boosting mobility performance with Multi-Path TCP Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network

Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

A Network-Controlled Architecture for SCTP Hard Handover

A Network-Controlled Architecture for SCTP Hard Handover A Network-Controlled Architecture for SCTP Hard Handover Khadija Daoud, Karine Guillouard, Philippe Herbelin Orange Labs, Issy Les Moulineaux, France {first name.last name}@orange-ftgroup.com Abstract

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Networking and High Availability

Networking and High Availability TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Performance Comparison of SCTP and TCP over Linux Platform

Performance Comparison of SCTP and TCP over Linux Platform Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr

More information

WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP

WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP Alae Loukili, Alexander Wijesinha, Ramesh K. Karne, and Anthony K. Tsetse Towson University Department of Computer & Information Sciences Towson, MD 21252

More information

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information